Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-14180

Опубликовано: 02 фев. 2018
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.

РелизСтатусПримечание
artful

released

2.20.7-0ubuntu3.4
devel

released

2.20.8-0ubuntu1
esm-infra-legacy/trusty

released

2.14.1-0ubuntu3.27
esm-infra/xenial

released

2.20.1-0ubuntu2.12
precise/esm

DNE

trusty

released

2.14.1-0ubuntu3.27
trusty/esm

released

2.14.1-0ubuntu3.27
upstream

released

2.20.8
xenial

released

2.20.1-0ubuntu2.12
zesty

released

2.20.4-0ubuntu4.7

Показывать по

EPSS

Процентиль: 14%
0.00045
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 8 лет назад

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.

CVSS3: 7.8
github
больше 3 лет назад

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость программного обеспечения формирования и отправки отчетов об ошибках Apport операционной системы Ubuntu, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии root

EPSS

Процентиль: 14%
0.00045
Низкий

7.2 High

CVSS2

7.8 High

CVSS3